Detecting Slow Port Scan Using Fuzzy Rule Interpolation

被引:0
|
作者
Almseidin, Mohammad [1 ]
Al-kasassbeh, Mouhammd [2 ]
Kovacs, Szilveszter [1 ]
机构
[1] Univ Miskolc, Dept Informat Technol, Miskolc, Hungary
[2] Princess Sumaya Univ Technol, Dept Comp Sci, Amman, Jordan
关键词
Fuzzy Rule Interpolation; Intrusion Detection System; Port Scan Attack; SNORT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fuzzy Rule Interpolation (FRI) offers a convenient way for delivering rule based decisions on continuous universes avoiding the burden of binary decisions. In contrast with the classical fuzzy systems, FRI decision is also performing well on partially complete rule bases serving the methodologies having incremental rule base creation structure. These features make the FRI methods to be perfect candidate for detecting and preventing different types of attacks in an Intrusion Detection System (IDS) application. This paper aims to introduce a detection approach for slow port scan attacks by adapting the FRI reasoning method. A controlled test-bed environment was also designed and implemented for the purpose of this study. The proposed detection approach was tested and evaluated using different observations. Experimental analysis on a real test-bed environment provides useful insights about the effectiveness of the proposed detection approach. These insights include information regarding the detection approach's efficacy in detecting the port scan attack and in determining its level of severity. In the discussion the efficacy of the proposed detection approach is compared to the SNORT IDS. The results of the comparison showed that the SNORT IDS was unable to detect the slow and very slow port scan attacks whereas the proposed FRI rule based detection approach was able to detect the attacks and generate comprehensive results to further analyze the attack's severity.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 50 条
  • [11] Fuzzy Rule Interpolation and Reinforcement Learning
    Vincze, David
    [J]. 2017 IEEE 15TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI), 2017, : 173 - 178
  • [12] Towards Hierarchical Fuzzy Rule Interpolation
    Jin, Shangzhu
    Peng, Jun
    [J]. PROCEEDINGS OF 2015 IEEE 14TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI*CC), 2015, : 267 - 274
  • [13] A generalized concept for fuzzy rule interpolation
    Baranyi, P
    Kóczy, LT
    Gedeon, TD
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2004, 12 (06) : 820 - 837
  • [14] Rough-fuzzy rule interpolation
    Chen, Chengyuan
    Mac Parthalain, Neil
    Li, Ying
    Price, Chris
    Quek, Chai
    Shen, Qiang
    [J]. INFORMATION SCIENCES, 2016, 351 : 1 - 17
  • [15] Special Issue on Fuzzy Rule Interpolation
    Kovacs, Szilveszter
    [J]. JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2011, 15 (03) : 253 - 253
  • [16] SIMILARITY, INTERPOLATION, AND FUZZY RULE CONSTRUCTION
    SUDKAMP, T
    [J]. FUZZY SETS AND SYSTEMS, 1993, 58 (01) : 73 - 86
  • [17] Hierarchical Bidirectional Fuzzy Rule Interpolation
    Jin, Shangzhu
    Jiang, Yanling
    Peng, Jun
    Shen, Qiang
    [J]. PROCEEDINGS OF 2018 IEEE 17TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI*CC 2018), 2018, : 351 - 357
  • [18] Fuzzy spline interpolation in sparse fuzzy rule bases
    Kawaguchi, MF
    Miyakoshi, M
    [J]. NEW PARADIGM OF KNOWLEDGE ENGINEERING BY SOFT COMPUTING, 2001, 5 : 95 - 120
  • [19] Extending the fuzzy rule interpolation "FIVE" by fuzzy observation
    Kovacs, Szilveszter
    [J]. Computational Intelligence, Theory and Application, 2006, : 485 - 497
  • [20] Detecting Malicious Transactions Using Fuzzy Association Rule Mining
    Singh, Indu
    Jindal, Rajni
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS), 2016, : 79 - 83